{"id":"CVE-2024-47827","summary":"Argo Workflows Controller: Denial of Service via malicious daemon Workflows","details":"Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Due to a race condition in a global variable in 3.6.0-rc1, the argo workflows controller can be made to crash on-command by any user with access to execute a workflow. This vulnerability is fixed in 3.6.0-rc2.","aliases":["BIT-argo-workflows-2024-47827","GHSA-ghjw-32xw-ffwr","GO-2024-3226"],"modified":"2026-03-20T12:39:19.468494Z","published":"2024-10-28T15:10:55.772Z","related":["SUSE-SU-2024:3911-1","openSUSE-SU-2024:0350-1","openSUSE-SU-2024:14447-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47827.json","cwe_ids":["CWE-1108","CWE-362"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/argoproj/argo-workflows/blob/ce7f9bfb9b45f009b3e85fabe5e6410de23c7c5f/workflow/metrics/metrics_k8s_request.go#L75"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47827.json"},{"type":"ADVISORY","url":"https://github.com/argoproj/argo-workflows/security/advisories/GHSA-ghjw-32xw-ffwr"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47827"},{"type":"FIX","url":"https://github.com/argoproj/argo-workflows/commit/524406451f4dfa57bf3371fb85becdb56a2b309a"},{"type":"FIX","url":"https://github.com/argoproj/argo-workflows/pull/13641"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/argoproj/argo-workflows","events":[{"introduced":"440f1ccc986c01ff0f76d161cb8c9389eadce3e2"},{"fixed":"5310c396ee1e9f4e5575f62ef5340a86540d8679"}]}],"versions":["v3.6.0-rc1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47827.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}